By Topic

13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008)

March 31 2008-April 3 2008

Filter Results

Displaying Results 1 - 25 of 47
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Technical Activities

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Verified Software: Theories, Tools, Experiments

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    The ideal of verified software has long been the goal of research in Computer Science. This paper argues that the time is ripe to embark on a Grand Challenge project to construct a program verifier, based on a sound and complete theory of programming, and evaluated by experimental application to a representative sample of useful computer software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Software Engineering Research in a Small Country

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    The Republic of Ireland has been a surprising success story in the global software market for reasons which are neither agreed nor obvious. However outsourcing towards lower cost countries is a threat to this success. One potential counter move is to invest heavily in software engineering research so as to stay ahead of the curve. To meet the national strategic need this research needs to be inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying Statecharts with State Invariants

    Publication Year: 2008, Page(s):7 - 14
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Statecharts are an executable visual language for specifying the reactive behavior of systems. We propose to statically verify the design expressed by a statechart by allowing individual states to be annotated with invariants and checking the consistency of the invariants with the transitions. We present an algorithm that uses the locality of state invariants for generating "many small" verificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying Semistructured Data Normalization Using PVS

    Publication Year: 2008, Page(s):15 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The dramatic expansion of semistructured data has led to the development of database systems for manipulating the data. Despite its huge potential, there is still a lack of formality and verification support in the design of good semistructured databases. Like traditional database systems, developed semistructured database systems should contain minimal redundancies and update anomalies, in order ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Approach to Multi-style Architectural Modeling and Verification

    Publication Year: 2008, Page(s):25 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1043 KB) | HTML iconHTML

    Software Architecture represents the high level description of a system in terms of components, external properties and communication. Despite its importance in the software engineering process, the lack of formal description and verification support limits the value of developing architectural models. Automated formal engineering methods can provide an effective means to precisely describe and ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting Safe Realizability of Message Sequence Charts Specifications

    Publication Year: 2008, Page(s):37 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Safe realizability of Message Sequence Charts (MSCs) specifications is a measure of whether or not there exists a distributed implementation of the specification such that it is deadlock free and shows exactly the behaviours specified in the specification. There are also some works that given a specification, can answer whether it is safely realizable or not. However, while these works are restric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iPSL: An Environment for IP-Based PSL Specification

    Publication Year: 2008, Page(s):46 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    In PSL, behavioral properties of an IP core and its environment are directed by different directives. Improperly directed properties will severely impact the validity of refinement verification, specification assurance, and the evolution of specification hierarchy. In this paper, we introduce a tool iPSL which supports users to apply IP-based design methodology to PSL specifications. iPSL incorpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task Mapping in Heterogeneous MPSoCs for System Level Design

    Publication Year: 2008, Page(s):56 - 65
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This paper investigates automatic mapping of application-to-architecture in heterogeneous Multi Processor System on a Chip (MPSoC), a key problem in system level design of embedded systems. An algorithm is proposed to optimally solve this application-to-architecture mapping problem. The proposed algorithm uses efficient branch-and-bound approach to partition the problem into sub problems and solve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Precision Relative Clock Synchronization Using Time Stamp Counters

    Publication Year: 2008, Page(s):69 - 78
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    In this paper we show how to use a computer processor's time stamp counter register to provide a precise and stable time reference, via a high-precision relative clock synchronization protocol. Existing clock synchronization techniques, such as the network time protocol, were designed for wide-area networks with large propagation delays, but the millisecond-scale precision they offer is too coarse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Real-Time Scheduling and Communication with Probabilistic Timing Assurances in Unreliable Distributed Systems

    Publication Year: 2008, Page(s):79 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    We consider distributed real-time systems that operate under run-time uncertainties including those on execution times and communication delays, and subject to arbitrary node failures and message losses. We present an integrated real-time scheduling and communication algorithm called real-time scheduling with reliable data delivery (RTSRD) that provides probabilistic end-to-end assurances on distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Predicting Outliers in Software is a Good Thing to Do!

    Publication Year: 2008, Page(s):91 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    A software reliability model is used to predict outliers, that is, values that significantly depart from the expected or mean values. In contrast with most projects that cleanse outliers from their databases because their presence distorts results, we tend to like outliers because by predicting them, we can help ensure safety in critical systems. We use the Space Shuttle failure data to make predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Extracting Tests from a Testable Model in the Context of Domain Engineering

    Publication Year: 2008, Page(s):98 - 107
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Software testing is the traditional way to verify the functionality of a given software system against its requirements. In domain engineering, these requirements consist of variabilities and commonalities observed in a domain and captured in a domain model [5]. We remark that the latter may be used to obtain an elaborate design; however tests cannot be derived from it. This observation proceeds f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Model of Semantic Web Service Ontology (WSMO) Execution

    Publication Year: 2008, Page(s):111 - 120
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Semantic Web services have been one of the most significant research areas within the semantic Web vision, and have been recognized as a promising technology that exhibits huge commercial potential. Current semantic Web service research focuses on defining models and languages for the semantic markup of all relevant aspects of services, which are accessible through a Web service interface. The Web... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jini++: A Framework for Developing Pervasive and Wireless Distributed Applications

    Publication Year: 2008, Page(s):121 - 130
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4253 KB) | HTML iconHTML

    Applications that run on mobile devices and which communicate over wireless networks are becoming increasingly ubiquitous. Conventional technologies developed for use over wired networks are however unsuitable for wireless environments. In particular, wireless links are relatively unreliable, bandwidth-constrained and can be expensive to use. Furthermore, established technologies do not address th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GENESIS - A Framework for Automatic Generation and Steering of Testbeds of ComplexWeb Services

    Publication Year: 2008, Page(s):131 - 140
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    Nowadays, the importance of Web services is steadily increasing in domains where interoperability is of paramount importance. This trend is especially observable in complex computer systems which consist of a large number of interacting distributed components, often implemented using Web services. Large-scale systems and high complexity usually result in higher error-proneness in the development p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.